While trying to figure out how to get wpa-cli related events, I notice that if I start wpa_cli like this: [root@lf0350-7220 lanforge]# wpa_cli -g /var/run/wpa_supplicant_if_wiphy0 wpa_cli v2.7-devel-hostap_2_3-5027-gd3f2ce9+ Copyright (c) 2004-2017, Jouni Malinen <j@xxxxx> and contributors This software may be distributed under the terms of the BSD license. See README for more details. ^C Then, the supplicant logs spam endlessly: 1496860152.726163: CTRL-DEBUG: global_ctrl_sock-sendto: sock=5 sndbuf=212992 outq=0 send_len=16 1496860152.726277: RX global ctrl_iface - hexdump_ascii(len=24): 53 54 41 2d 4e 45 58 54 20 55 4e 4b 4e 4f 57 4e STA-NEXT UNKNOWN 20 43 4f 4d 4d 41 4e 44 COMMAND 1496860152.726349: CTRL-DEBUG: global_ctrl_sock-sendto: sock=5 sndbuf=212992 outq=0 send_len=16 1496860152.726555: RX global ctrl_iface - hexdump_ascii(len=24): 53 54 41 2d 4e 45 58 54 20 55 4e 4b 4e 4f 57 4e STA-NEXT UNKNOWN 20 43 4f 4d 4d 41 4e 44 COMMAND 1496860152.726627: CTRL-DEBUG: global_ctrl_sock-sendto: sock=5 sndbuf=212992 outq=0 send_len=16 1496860152.726786: RX global ctrl_iface - hexdump_ascii(len=24): 53 54 41 2d 4e 45 58 54 20 55 4e 4b 4e 4f 57 4e STA-NEXT UNKNOWN 20 43 4f 4d 4d 41 4e 44 COMMAND 1496860152.726863: CTRL-DEBUG: global_ctrl_sock-sendto: sock=5 sndbuf=212992 outq=0 send_len=16 1496860152.727062: RX global ctrl_iface - hexdump_ascii(len=24): 53 54 41 2d 4e 45 58 54 20 55 4e 4b 4e 4f 57 4e STA-NEXT UNKNOWN 20 43 4f 4d 4d 41 4e 44 COMMAND .... I saw a LEDE patch that appeared to try to hack around this or a similar issue, but I guess that never made it upstream. http://lists.infradead.org/pipermail/lede-dev/2017-April/007002.html Any suggestions for the proper way to fix this? Thanks, Ben -- Ben Greear <greearb@xxxxxxxxxxxxxxx> Candela Technologies Inc http://www.candelatech.com _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap